In a disturbing revelation, Kohler’s recently launched smart toilet, the Dekota, was found not to employ true end-to-end encryption as advertised. Security researcher Simon Fondrie-Teitler discovered that while data is encrypted from the device to Kohler’s servers, the company decrypts it for processing—contrary to the common understanding of end-to-end encryption. Following this critique, Kohler has removed instances of this misleading term from their product descriptions.
In addition to the Kohler revelations, the week’s security news also included significant incidents involving cybersecurity and espionage. The United States declined to sanction China for its Salt Typhoon cyberespionage campaign, which compromised numerous telecoms and accessed sensitive communications, including those of high-profile political figures. This decision has drawn criticism for potentially undermining national security in pursuit of a trade deal.
Meanwhile, Sean Plankey’s nomination to lead the Cybersecurity and Infrastructure Agency (CISA) appears to be stalled in Congress, facing opposition from various senators over unrelated political concerns.
On the malware front, a stealthy Chinese spyware known as "Brickstorm" has been infecting organizations since 2022, raising alarms over its capabilities for espionage and potential sabotage. CISA and other agencies have issued advisories for identifying this malware, highlighting the serious threat it poses with an alarming average detection time of 393 days after breach.
These stories underscore the ongoing challenges in cybersecurity, privacy, and the ever-evolving landscape of technology. For further details, read the complete articles linked below:
- Oh Crap, Kohler’s Toilet Cameras Aren’t Really End-to-End Encrypted
- US Won’t Sanction China for Salt Typhoon Hacking in Effort to Maintain Trade Truce
- Sean Plankey’s Nomination to Lead CISA May Be Terminally Stalled in Congress
- Officials and Google Warn of Stealthy Chinese “Brickstorm” Espionage Malware